CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy
|
|
- Emery Thomas
- 8 years ago
- Views:
Transcription
1 CrypTool A free software program for creating awareness of IT security issues for learning about and obtaining experience of cryptography for demonstrating encryption algorithms and analysis procedures Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy
2 Contents Introduction 1. What is CrypTool? 2. Why CrypTool? 3. Audience CrypTool Overview 1. Features 2. Software package contents 3. New in release 1.3.xx Examples of use 1. Hybrid encryption visualised 2. Digital signature visualised 3. Attack on RSA encryption with short RSA modulus 4. Analysis of encryption used in the PSION 5 PDA 5. Demonstration of weak DES keys 6. Locating key material (keyword: NSAKEY) 7. Attack on digital signature Contact addresses CrypTool page 2
3 Introduction 1. What is CrypTool? a freeware Program with graphical user interface a tool for applying and analysing cryptographic algorithms with extensive online help, understandable without deep crypto knowledge contains nearly all state of the art crypto algorithms playful introduction to modern and classical cryptography not a hacker tool 2. Why CrypTool? origin in Deutsche Bank s IT security awareness program developed in co-operation with universities improve IT security related courses in universities and companies 3. Audience target group: students of computer science, commercial IT and mathematics also aimed at: interested computer users and application developers prerequisites: secondary school mathematics or programming skills CrypTool page 3
4 CrypTool Overview 1. Features Cryptography Classical algorithms Caesar Vigenère Hill Monoalphabetic substitution Homophonic substitution Playfair Permutation Addition XOR Vernam To facilitate performing text book examples with CrypTool alphabet can be configured treatment of white space etc. configurable Cryptanalysis Attacks on classical algorithms ciphertext only Caesar Vigenère Addition XOR known plaintext Hill Playfair manual mono-alphabetic substitution Supporting analysis procedures entropy, floating frequency histogram, n-gram analysis auto-correlation ZIP compression test CrypTool page 4
5 CrypTool Overview 1. Features Cryptography Modern symmetric algorithms IDEA, RC2, RC4, DES, 3DES last round AES candidates AES (=Rijndael) Asymmetric algorithms RSA with X.509 certificates RSA demonstration to facilitate performing text book examples with CrypTool alphabet and block length configurable Hybrid encryption RSA combined with AES encryption visualised by an interactive data flow diagram Cryptanalysis Brute-force attack on symmetric algorithms implemented for all algorithms assumption: entropy of the plain text is small Attack on RSA encryption factor RSA modulus workable for bit lengths <= 250 Attack on hybrid encryption attack on RSA (see below) or attack on AES (see above) CrypTool page 5
6 CrypTool Overview 1. Features Cryptography Digital Signature RSA with X.509 certificates signature procedure visualised by an interactive data flow diagram DSA with X.509 certificates Elliptic curve DSA, Nyberg-Rueppel Hash functions MD2, MD4, MD5 SHA, SHA-1, RIPEMD-160 Random generators SECUDE X^2 modulo N Linear Congruence Generator (LCG) Inverse Congruence Generator (ICG) Cryptanalysis Attack on RSA Signature RSA modulus factorisation workable up to approx. 250 bit Attack on hash function/digital signature Generation of hash collisions to ASCII texts Random data analysis FIPS-PUB test battery periodicity, Vitany, entropy histogram, n-gram analysis auto-correlation ZIP compression test CrypTool page 6
7 CrypTool Overview 2. Software package contents completely bilingual English German CrypTool program all functions integrated in one program with uniform graphical user interface platforms: Win32 and Linux with WINE emulator cryptography based on Secude library ( arbitrary precision arithmetic: Miracl library ( AES-Tool standalone program for AES encryption (self extracting) Extensive online help (Winhelp) context sensitive online help for all program functions and all menu items detailed examples of usage for many program features Script (PDF) with background information on encryption algorithms prime numbers digital signature elliptic curves public key certification elementary number theory Short story Dialogue of the Sisters by Dr. C. Elsner CrypTool page 7
8 CrypTool Overview 3. New in release 1.3.xx Most important changes (details: see ReadMe-en.txt): Release published January 2002 completely bilingual English/German improved dialog box consistency and comprehensibility Windows 9x file size limit removed homophonic and permutation encryption random generators, random data analysis (FIPS-140-1, periodicity, n-gram) AES-Tool: create self-decrypting files (AES) demonstration: number theory and RSA crypto system (further improved in ) PKCS#12 export/import for PSEs Release published September 2002 visualisation of hybrid encryption and decryption visualisation of signature creation and verification hash value calculation of large files (without loading them into memory) visualisation of the sensitivity of hash functions to changes in the hashed data short story Dialogue of the Sisters by Dr. C. Elsner included CrypTool page 8
9 CrypTool Overview 3. New in release 1.3.xx Release published July 2003 visualisation of Diffie-Hellman key exchange attack on digital signature using hash-collisions (birthday paradox) brute-force attack on symmetric ciphers improved script updated (primes, factorization) and extended (hash functions, ECC, CrypTool menu tree) many small improvements (especially online help) and bug fixes Release published August 2003 small bug fixes CrypTool page 9
10 1. Hybrid encryption visualised Hybrid encryption combines advantages of symmetric and asymmetric encryption speed simple and scalable key management widely used in practice (S/MIME, PGP) and file encryption SSL (https) data Visualisation by an interactive data flow diagram operation playful learning leads to deeper understanding display area grey = missing precondition preliminary steps CrypTool page 10
11 1. Hybrid encryption visualised: Preparation 1. select file 2. click on document 3. contents displayed here CrypTool page 11
12 1. Hybrid encryption visualised: Cryptography 4. create random key 5. select asymmetric key 6. now document and session key can be encrypted CrypTool page 12
13 1. Hybrid encryption visualised: Result 7. encrypted document and encrypted session key are now available and can be displayed or written into a file CrypTool page 13
14 2. Digital signature visualised Digital signature increasingly important equivalence with manual signature (digital signature law) increasingly used by industry, government and consumers few people know how it works Visualisation in CrypTool interactive data flow diagram similar to the visualisation of hybrid encryption CrypTool page 14
15 2. Digital signature visualised: Preparation 1. select hash function 2. provide key and certificate (not shown here) CrypTool page 15
16 2. Digital signature visualised: Cryptography 3. calculate hash value 4. encrypt hash value 5. generate signature CrypTool page 16
17 2. Digital signature visualised: Result The signed document can now be saved. The operations can be performed in any order, as permitted by data dependencies. CrypTool page 17
18 3. Attack on RSA encryption with short RSA modulus Example from Song Y. Yan, Number Theory for Computing, Springer, 2000 public key RSA modulus N = (95 bit, 29 decimal digits) public exponent e = cipher text (block length = 14): C 1 = , C 2 = , C 3 = , C 4 = the text shall be deciphered! Solution using CrypTool (more detailed in online help examples section): enter public parameters into RSA cryptosystem (menu indiv. procedures) button factorise the RSA modulus yields prime factors pq = N based on that information private exponent d=e -1 mod (p-1)(q-1) is determined decrypt the cipher text with d: M i = C d i mod N The attack with CrypTool is workable for RSA moduli up to 250 bit CrypTool page 18
19 : 3. Short RSA modulus: enter public RSA parameters 2. factorise 1. enter RSA parameters N and e CrypTool page 19
20 : 3. Short RSA modulus: factorise RSA modulus 3. factorisation yields p and q CrypTool page 20
21 : 3. Short RSA modulus: determine private key d 4. p and q have been entered automatically and secret key d has been calculated 5. adjust options CrypTool page 21
22 : 3. Short RSA modulus: adjust options 6. select alphabet 7. select coding method 8. select block length CrypTool page 22
23 : 3. Short RSA modulus: decrypt cipher text 9. enter cipher text 10. decrypt CrypTool page 23
24 4. Analysis of encryption used in the PSION 5 PDA Attack on the encryption option in the PSION 5 PDA word processing application Starting point: an encrypted file on the PSION Requirements encrypted English or German text depending on method and key length, 100 bytes up to several kb of text Procedure pre-analysis entropy floating entropy probably classical compression test encryption algorithm auto-correlation try out automatic analysis with classical methods CrypTool page 24
25 4. PSION PDA: determine entropy, compression test compressibility: clear indicator for weak cryptography (size was reduced by 21%) CrypTool page 25
26 4. PSION PDA: determine auto-correlation distinctive comb pattern: typical for Vigenère, XOR and binary addition CrypTool page 26
27 4. PSION PDA: automatic analysis Automatic analysis using XOR: does not work Automatic analysis using Binary Addition: CrypTool calculates the key length using auto-correlation: 32 bytes The user can choose which character is expected to occur most frequently: e = 0x65 (ASCII code) Analysis calculates the most likely key (based on the assumptions about distribution) Results: good, but not perfect CrypTool page 27
28 4. PSION PDA: results of automatic analysis Results of automatic analysis with assumption binary addition : results good, but not perfect: 24 out of 32 key bytes correct. the key length was correctly determined. the password entered was not 32 bytes long. PSION Word derives the actual key from the password. manual post-processing produces the encrypted text (not shown) CrypTool page 28
29 4. PSION PDA: determining the remaining key bytes Copy key to clipboard during automatic analysis In automatic analysis hexdump, determine incorrect byte positions, e.g. 0xAA at position 3 guess and write down corresponding correct bytes: e = 0x65 In encrypted initial file hexdump, determine initial bytes from the calculated byte positions: 0x99 calculate correct key bytes with CALC.EXE: 0x99-0x65 = 0x34 Correct key from the clipboard 12865B C393E A E111E907AB7C Decrypt encrypted initial document using binary addition bytes at position 3, 3+32, 3+2*32,... are now correct CrypTool page 29
30 5. Weak DES keys encrypt 2 with CrypTool page 30
31 6. Locate key material The function Floating frequency is suitable for locating key material and encrypted areas in files. Background: key data is more random than text or program code can be recognised as peaks in the floating frequency example: the NSAKEY in advapi32.dll CrypTool page 31
32 7. Attack on digital signature: idea Attack on the digital signature of an ASCII text based on hash collision search Idea: ASCII-Texts can be modified by changing/inserting non-printable characters, without changing the visible content modify two texts in parallel until a hash collision is found exploit the birthday paradox (birthday attack) generic attack applicable to all hash functions can be run in parallel on many machines (not implemented) implemented in CrypTool by Jan Blumenstein as part of his bachelor thesis Methods and tools for attacks on digital signatures (German), CrypTool page 32
33 7. Attack on digital signature: idea (2) Modification: starting from a message M create N different messages M 1,..., M N with the same content as M. harmless message M H Compare hashes 3. Identical signatures 2. Search: find modified messages M H i und M S j with the same hash value. 3. Attack: the signatures of those two documents M H i und M S j are the same. evil message M S We know from the birthday paradox that for hash values of bit length n: search collision between M H and M 1S,..., M S N : N 2 n search collision between M 1H,..., M H N and M 1S,..., M S N : N 2 n/2 CrypTool page 33
34 7. Attack on digital signature: attack CrypTool page 34
35 7. Attack on digital signature: results MD5: A AB F 70 1F 6C 6C 3F 2F 6D MD5: A AB AC CC D5 70 D Experimental results 72 Bit partial collision (equality of the first 72 hash value bits) were found in a couple of days on a single PC. Signatures using hash values of up to 128 bit can be attacked today using massive parallel search! The first 32 bits of the hash values are identical. CrypTool page 35
36 Further development Work in process visualisation of challenge-response authentication attack on single-sided authentication with CR and weak encryption mass pattern search Planned for near future visualisation of SSL protocol visualisation of Man-in-the-Middle attack demonstration of a side-channel attack Planned for remote future visualisation of different security protocols (e.g. Kerberos) visualisation of attacks on these different security protocols port to Linux or Java many more ideas can be found in the readme file, chapter 6 CrypTool page 36
37 Contact addresses Prof. Dr. Claudia Eckert Bernhard Esslinger Technical University Darmstadt - University of Siegen Faculty of Computer Science Faculty of Economics IT Security - Deutsche Bank AG Wilhelminenstr. 7 Information Security Darmstadt, Germany bernhard.esslinger@db.com claudia.eckert@ besslinger@web.de sec.informatik.tu-darmstadt.de Thorsten Clausius Technical University Darmstadt thorsten.clausius@ sec.informatik.tu-darmstadt.de Jörg Cornelius Schneider Deutsche Bank AG joerg-cornelius.schneider@db.com js@joergschneider.com Mailing list: cryptool-list@sec.informatik.tu-darmstadt.de CrypTool page 37
CrypTool. Modern open-source e-learning programs for cryptography and cryptanalysis. April 23 rd, 2013 FRISC-Winter School FINSE
CrypTool Modern open-source e-learning programs for cryptography and cryptanalysis Professor Bernhard Esslinger, University of Siegen April 23 rd, 2013 FRISC-Winter School FINSE Agenda 1 Why we created
More informationIT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
More informationCS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
More informationNetwork Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationTable of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
More information1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
More informationAN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
More informationOverview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
More informationCommon Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP
More information7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
More informationCIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
More informationLecture 6 - Cryptography
Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about
More informationSECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
More informationLecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
More informationCRYPTOG NETWORK SECURITY
CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;
More informationEXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
More informationCryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.edu Overview Cryptanalysis Challenge Encryption: DES AES Message
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
More informationSecure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
More informationSoftware Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
More informationTechniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab
Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the
More informationAuthentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
More informationChapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
More information, ) I Transport Layer Security
Secure Sockets Layer (SSL, ) I Transport Layer Security _ + (TLS) Network Security Products S31213 UNCLASSIFIED Location of SSL -L Protocols TCP Ethernet IP SSL Header Encrypted SSL data= HTTP " Independent
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationCIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
More informationVALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202
More informationNetwork Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationHow To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
More informationSolutions to Problem Set 1
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose
More informationCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New
More informationCryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
More informationChapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
More informationDigital Signature For Text File
Digital Signature For Text File Ayad Ibrahim Abdulsada Dept. of Computer Science, College of Education, University of Basrah, Basrah, Iraq. E-mail: mraiadibraheem@yahoo.com Abstract: Digital signatures
More informationSECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
More informationCryptographic mechanisms
General Secretariat for National Defence Central Directorate for Information Systems Security PRIME MINISTER Paris, 2007 september 14 No. 1904/SGDN/DCSSI/SDS/LCR Cryptographic mechanisms Rules and recommendations
More informationNetwork Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
More informationCryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
More information159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
More informationEXAM questions for the course TTM4135 - Information Security June 2010. Part 1
EXAM questions for the course TTM4135 - Information Security June 2010 Part 1 This part consists of 6 questions all from one common topic. The number of maximal points for every correctly answered question
More informationEvaluation of Digital Signature Process
Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: esimion@fmi.unibuc.ro Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;
More informationHow To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
More informationOverview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
More informationHow To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
More informationAn Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
More informationFinal Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationChapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
More informationNetwork Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
More informationNetwork Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
More informationLecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
More informationEvaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationNetwork Security. Outline of the Tutorial
Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and
More informationSimple Encryption/Decryption Application
Simple Encryption/Decryption Application Majdi Al-qdah Faculty of Information Technology Multimedia University Cyberjaya, 63100, Malaysia majdi.qdah@mmu.edu.my Lin Yi Hui Faculty of Information Technology
More informationPublic Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
More informationCryptography Exercises
Cryptography Exercises 1 Contents 1 source coding 3 2 Caesar Cipher 4 3 Ciphertext-only Attack 5 4 Classification of Cryptosystems-Network Nodes 6 5 Properties of modulo Operation 10 6 Vernam Cipher 11
More informationCS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
More informationCryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
More informationNetwork Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
More informationMessage Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
More informationThe Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft
More informationSECURITY EVALUATION OF EMAIL ENCRYPTION USING RANDOM NOISE GENERATED BY LCG
SECURITY EVALUATION OF EMAIL ENCRYPTION USING RANDOM NOISE GENERATED BY LCG Chung-Chih Li, Hema Sagar R. Kandati, Bo Sun Dept. of Computer Science, Lamar University, Beaumont, Texas, USA 409-880-8748,
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationBlackBerry Enterprise Solution
BlackBerry Enterprise Solution Security Technical Overview for BlackBerry Enterprise Server Version 4.1 Service Pack 5 and BlackBerry Device Software Version 4.5 2008 Research In Motion Limited. All rights
More informationCryptography and Network Security Chapter 11
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 11 Cryptographic Hash Functions Each of the messages, like each
More informationNetwork Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
More informationChapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
More informationCS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
More informationSecure Network Communication Based on Text-to-Image Encryption
Secure Network Communication Based on Text-to-Image Encryption Ahmad Abusukhon 1, Mohamad Talib 2, Issa Ottoum 3 1 IT Faculty, - Computer Network Department Al-Zaytoonah University of Jordan Amman, JORDAN
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationOutline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
More informationSandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology s.mahapatra15101987@gmail.com
Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Comparative Evaluation of Various Encryptions Techniques Committing
More informationCryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
More informationIs Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
More informationAESvisual: A Visualization Tool for the AES Cipher
AESvisual: A Visualization Tool for the AES Cipher Jun Ma, Jun Tao Department of Computer Science Michigan Technological University Houghton, MI {junm,junt}@mtu.edu Melissa Keranen Department of Mathematical
More informationA New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
More informationCryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
More informationThe Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
More informationNetwork Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
More informationCryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
More informationSecurity Policy for Oracle Advanced Security Option Cryptographic Module
Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the
More informationFIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
More informationCryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
More informationSCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
More informationCenter for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Private and Public Key Cryptography and Ransomware December 2014 Authored by:ted Fischer (CIS) Security Operations
More informationMessage Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More informationSecurity in Distributed Systems. Network Security
Security in Distributed Systems Introduction Cryptography Authentication Key exchange Computer Science Lecture 18, page 1 Network Security Intruder may eavesdrop remove, modify, and/or insert messages
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
More informationApplication Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
More informationNetwork Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
More information